Check Point Blog

Globally, the number of sophisticated and advanced persistent threats -or prolonged espionage-style attacks on organizations- has risen exponentially. New interception capabilities and data exfiltration methods have only increased hackers’ appetite for destruction, making cyber crime…

By Dana Katz, Head of Product Marketing, Threat Prevention During the COVID-19 crisis, cyber-criminals have not gone into quarantine. They continue to seek out system vulnerabilities, and they do not mercy the hospitals. Attacks against…

By Yael Macias, Product Marketing Manager, Threat Prevention We are excited to share the news that Frost & Sullivan has presented Check Point with the Frost Radar Best Practices Award for Growth, Innovation & Leadership…

We all like to think we would never fall for a phishing attempt. Unfortunately, none of us are immune because we all make mistakes. Verizon’s 2019 Data Breach Investigations Report showed that nearly one-third (32%) of data…

Microservices are quickly changing the face of cloud computing, giving cloud architects the tools needed to move away from provisioning resources statically, such as with servers and virtual machines (VMs). New types of workloads, like…

Can you defend against zero day threats? Most organizations cannot. But with the right technology, organizations can not only detect more zero days, but also stave them off–without having to compromise on business agility or…

Over the past month, many articles have been published recommending that we keep our mobile phones clean to reduce the risk of Coronavirus infection. While there’s still some debate over whether it’s necessary to clean…

By Hezi Bahry, Product Manager, CloudGuard IaaS, published April 8, 2020 I have come to realize, over many years of purchasing various products, that the product price is one of the most misleading parameters in…